Attack on Westgate Shopping Centre in Nairobi, Kenya, September 2013 Analysis and Insights

Size: px
Start display at page:

Download "Attack on Westgate Shopping Centre in Nairobi, Kenya, September 2013 Analysis and Insights"

Transcription

1 Attack on Westgate Shopping Centre in Nairobi, Kenya, September 2013 Analysis and Insights * It is important to note that the information provided in this analysis is derived from information collected from open sources only and made available to date to the general public. There is still much information regarding the attack not reported or made public at this time. Brief Timeline of Major Events DAY 1: Saturday September 21 At around noon local time on September 21, 2013 a reported 10 to 15 gunmen stormed the Westgate Shopping Centre armed with assault weapons and grenades from three points: (1) drove up to the main entrance; (2) via a rooftop car part; and, (3) down a ramp to a basement area. At the time of the attack, the building complex, which has six levels housing shopping, eating and leisure as well as offices and a basement, was packed with shoppers and people having lunch. Witness reported that the gunmen went from store to store shooting people and then took hostages. Westgate Mall diagram, Nairobi, Kenya The Somalia-based Al-Shabaab terror group claimed responsibility for the attack as retaliation for Kenya s involvement in an African Union military effort against the group, which is al Qaeda s proxy in Somalia. In 2011, the Kenyan military was part of a peacekeeping force that defeated al-shabaab forces to liberate the key Somali port of Kismayo. Scenes from inside the Shopping Centre and people fleeing the mall following the attack Al-Shabaab stated that the attackers targeted non-muslims and vowed that they would not negotiate for the lives of the hostages. According to reports from surviving witnesses,

2 gunmen asked customers whether they were Muslim and allowed Muslims to escape from the mall. Police and security force response was initially focused on rescuing civilians trapped inside the mall. Approximately an hour into the attack, security forces entered the building and a gun battle ensued between police and the attackers. Armed forces and helicopters were deployed. Gunfire and explosions continued overnight. DAY 2: Sunday September 22 Gunfire erupted at various times throughout the day between al-shabaab terrorists and security forces inside the mall and surrounding perimeter areas as Kenyan military and security forces decided to launch an assault on the mall. Helicopters landed on the roof late in the afternoon in an operation to retake the mall. According to Kenyan reports, most of the hostages and survivors were evacuated from the shopping centre area and security forces were able to take control over most parts of the mall. DAY 3: Monday September 23 Sporadic gunfire and loud explosions continued as security forces launched a renewed assault. Reports of the dead and wounded began to leak out to the public. Fire erupted in parts of the building and some interior floors and part of the car park collapsed. Three floors of the mall collapsed during the government counter-offensive against the terrorists. Two of the al-shabaab terrorists identified by CCTV cameras in the Shopping Centre Kenyan officials announced that they were in control of the mall, giving the terrorists little chance of escape. DAY 4: Tuesday September 24 On Tuesday evening, Kenyan President Uhuru Kenyatta announced that the siege had ended and that security forces killed five terrorists at the mall and arrested 11 others for possible involvement in the attack.

3 To date, there are an unconfirmed number of dead, wounded and missing. Closest estimates given by the Red Cross place the number of casualties at 67 people with an additional 39 people unaccounted for; however, those figures are unconfirmed by the Kenyan government. An additional 175 people are reported wounded. The partial collapse of the building, due to the detonation of explosives, contributed significantly to the figures of dead, wounded and missing. Analysis and Insights The Westgate Shopping Centre attack is the deadliest terror attack in Kenya since al Qaeda blew up the United States Embassy in 1998, killing 213 people. Several sources have confirmed that Kenyan security forces and several ministers had received warnings of a possible attack by Islamic militants prior to the attack. Although it would appear that the information received was general in nature, it directs attention toward the need to determine protection levels during periods of threat. Media reports quoting senior security sources stated that the al Shabaab terrorist group rented a shop in the Westgate Shopping Centre in the weeks leading up to, or, as some reports claim, up to a year prior to the attack. The shop gave access to service lifts, enabling the attackers to stockpile weapons and ammunition. The claim is supported by reports that the levels of weapons and ammunitions involved in the attack suggest long-term planning. According to several reports, British and American citizens were among the group of militants who took part in the attack. Al Shabaab used Twitter to convey messages to the public throughout the attack. The group released a series of Twitter messages claiming that 137 hostages had been killed to date and that foreigners were involved in carrying out the attack, among other statements. There are a number of reasons why Kenya may have been identified as an attractive target for carrying out an attack, in addition to Kenyan military involvement against al Shabaab in Somalia. The Kenyan population is comprised of a high percentage of Muslims (11 percent) as well as a large Somali refugee community which enables the adversary to blend in and utilize local infrastructures. Furthermore, poverty, porous borders, corruption, inept police, failed governments and rising disillusionment among young Islamists have made Kenya and other African nations easy targets and potential havens for global terrorists. Kenya, specifically, is a familiar region for terrorist organizations like al Qaeda who has both taken up refuge and operated in the country. It is known that arms smuggling along the porous borders, including the coastline, is routinely carried out from Somalia.

4 The Dilemmas of Protecting of Soft Targets The attack on the Westgate mall indicates a continuing trend of terror groups to attack soft targets including hotels, malls, sports events and schools. Soft targets are by definition assets that are either not protected or not protected to a high level. They are usually open to the public with very limited access control. The main dilemma with respect to soft targets is that there are almost an unlimited number of potential soft targets in a country and it is neither feasible nor possible for a nation s security forces to protect them all. In addition, it is important to recognize that when the soft target is linked to tourism especially in countries that depend on tourism, the secondary economic impact can be almost worse than the attack itself. As a result, it becomes vital to implement a risk assessment approach involving pro-active security solutions that achieve maximum protection without damaging the industry. Proactive security solutions incorporate multi-layered security deployment, behavior pattern recognition and a community approach aimed at early detection of potential threats. The Westgate Mall in Nairobi is the country s most well-known and prestigious mall and is the main shopping and leisure center for middle class Kenyans, expatriate communities and tourists. As such, it could be considered iconic for Kenya and perhaps warranting of a higher level of protection Lessons Learned and Recommendations The level of planning and the magnitude of the attack indicate that al Qaeda in general and al Shabaab in particular remains a serious threat and that terrorists are continuing to seek to inflict severe consequences from their attacks. Armed assault scenarios continue to be a viable threat and need to be addressed by both government security agencies and private security sector alike. One of the major challenges security commanders on the ground are faced with during an armed assault/active shooter scenario is determining whether the attack is ongoing and innocent people are being killed, injured or put in harm s way or that the situation has become a hostage scenario. This is a crucial challenge as an ongoing attack required immediate intervention and a seek and engage mindset whereas a hostage crisis requires almost the opposite. Wrongly characterizing the situation either way will have critical consequences. Structural hardening and other blast mitigation measures should be considered in the planning stages for new construction of shopping centers and other facilities. High profile shopping malls need to have trained security deployments with the necessary skill sets to deal with active shooter scenarios. Training in irregular behavior detection is

5 important for the early identification of potential threats and pre-attack reconnaissance. Security deployment must be proactive and create deterrence as unprotected assets create vulnerability which attracts the adversary. We believe it is important to train security personnel to identify out of the ordinary, or telltale indicators (TTIs), which could point to the possibility of malicious intent. It is also possible to recruit non-security personnel, including shop workers, maintenance and cleaning personnel and even customers themselves into the security effort, adding eyes on the ground and serving as a valuable deterrent to potential attackers. Security vetting may serve as a potential counter measure for identifying attempts by the adversary to carry out pre-attack reconnaissance using the insider threat. Renters from unknown origins, i.e. not a well-known brand or retail chain, looking to rent shops or space in iconic shopping centres, may be subject to background checks or other forms of vetting. Partnerships between law enforcement and the private sector are important force multipliers for dealing with the issue of soft targets. This incident highlights the dilemma regarding how to evaluate warning and threat-related information as well as who should issues and what kind of directives should be issued and to whom to ensure an appropriate level of security and response in place. Security measures must be taken to meet relevant threat information. The wide use of Twitter by al Shabaab demonstrates the growing importance of social media as a terrorist tool. It is important to ensure that terrorist sites, mediums, message boards and posts are closely monitored by relevant security agencies as a valuable tool for early detection of potential threats, measuring social temperament and obtaining a situational picture during an attack. Due to the multitude of soft targets security commanders must use a risk management approach toward determining which assets need to be protected, what level of protection they will receive and how to raise protection levels when there is an increase in threat. It is clear that if a terror attack is not challenged and defeated or at least mitigated at the start of the incident the situation is likely to deteriorate rapidly with severe consequences. It is feasible for security forces deployed at protected facilities, whether police or private guards, to deal with armed assaults providing they have the right training, mindset and procedures. Security forces should also be able to put to good use their intimate knowledge of their own building which should not be able to be matched by the terrorists. Mr. David Harel, Managing Director, ASERO Israel is our anti-terrorism subject matter expert and a retired officer from the Israeli Security Agency (Shin Bet). David is a sought after speaker throughout the world on the topics of Homeland Security, Protective Security and Risk Management.

Al-Shabaab Attack on Westgate Mall in Kenya

Al-Shabaab Attack on Westgate Mall in Kenya Frequency BACKGROUND REPORT Al-Shabaab Attack on Westgate Mall in Kenya On Saturday, Sept. 21, gunmen attacked Westgate Mall in Nairobi, Kenya. After a four-day standoff, Kenyan officials indicated that

More information

Planning & Response Considerations for Mass Shooting Incidents

Planning & Response Considerations for Mass Shooting Incidents Planning & Response Considerations for Mass Shooting Incidents This PDF is a variety of slides from my 4-hour Multi-Agency Mass Shootings Planning & Response Course May 2008 version. I developed this PDF

More information

Law Enforcement and Homeland Security Anti-Terrorism Training

Law Enforcement and Homeland Security Anti-Terrorism Training Law Enforcement and Homeland Security Anti-Terrorism Training Our Experience Influences Your Success Florida Department of Law Enforcement A close partnership was developed between FDLE and ASERO while

More information

6th Annual Homeland Security Professionals Conference & Expo October 3-7, 2011

6th Annual Homeland Security Professionals Conference & Expo October 3-7, 2011 This year s conference looks at developments around the Globe that will impact on terrorism and crime in the USA. Instead of looking at attack response, as in past years, the conference will be dedicated

More information

STANDARD OPERATING PROCEDURE FOR DEALING WITH ANY TERRORIST ATTACK ON SCHOOLS.

STANDARD OPERATING PROCEDURE FOR DEALING WITH ANY TERRORIST ATTACK ON SCHOOLS. STANDARD OPERATING PROCEDURE FOR DEALING WITH ANY TERRORIST ATTACK ON SCHOOLS. 1. Background: Experience gained in handing terrorism in recent years has shown that with a view to gain widespread media

More information

VIP Protection Tactical Course

VIP Protection Tactical Course VIP Protection Tactical Course Course Topics Include: Crisis Recognition and Reaction Roles and Responsibilities of the VIP Protection Agent, Krav Maga for VIP Protection Firearms The Operational Advance

More information

SCENARIO EXAMPLES. Lockdown: Used to safeguard students and staff when a threat exists within the building and evacuation is not possible.

SCENARIO EXAMPLES. Lockdown: Used to safeguard students and staff when a threat exists within the building and evacuation is not possible. SCENARIO EXAMPLES This section will give a short and a long scenario example for each of the four common response protocols (lockdown, lockout, shelter-in-place and evacuation), as well as reunification.

More information

ACTIVE THREAT TEMPLATE

ACTIVE THREAT TEMPLATE ACTIVE THREAT TEMPLATE Background Information for departments developing this template for their Building Emergency Plan - Each individual is ultimately responsible for their own safety. In any response

More information

Theme: The Growing Role of Private Security Companies in Protecting the Homeland.

Theme: The Growing Role of Private Security Companies in Protecting the Homeland. Theme: The Growing Role of Private Security Companies in Protecting the Homeland. Background on terrorist organizations: A global threat, every object is a target, infinite number of targets. Terrorist

More information

TENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY TENNESSEE OFFICE OF HOMELAND SECURITY

TENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY TENNESSEE OFFICE OF HOMELAND SECURITY Page0 Wm. R. Snodgrass TN Tower, 25 th Floor Nashville, TN 37243 (615) 532-7825 homelandsecurity@tn.gov Page 1 TENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY Current as of June 1, 2013 LAW ENFORCEMENT

More information

Examples of International terrorist attacks since 9/11

Examples of International terrorist attacks since 9/11 PAPER ONE INTERNATIONAL TERRORISM: THE THREAT Any discussion of the Government s strategy to reduce the threat from international terrorism to the UK and its citizens must begin with the nature of the

More information

Shopping Center Security Leadership Summit

Shopping Center Security Leadership Summit Shopping Center Security Leadership Summit March 20-21, 2013 Renaissance Baton Rouge Hotel International Council of Shopping Centers (ICSC) National Center for Security Research and Training (NCSRT) Shopping

More information

A school crisis is any event that drastically disrupts or alters a normal school day for your campus. More dynamic if the media covers the event!!

A school crisis is any event that drastically disrupts or alters a normal school day for your campus. More dynamic if the media covers the event!! Critical Incident Management Instructor: Lieutenant Mo Canady, Hoover Police Department What Is A School Crisis?? A school crisis is any event that drastically disrupts or alters a normal school day for

More information

Training Courses Catalog 2015

Training Courses Catalog 2015 Training Courses Catalog 2015 Office of Homeland Security Tennessee Department of Safety & Homeland Security Homeland Security Training January 2015 Law Enforcement and Public Safety Courses Introduction

More information

TENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY TENNESSEE OFFICE OF HOMELAND SECURITY

TENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY TENNESSEE OFFICE OF HOMELAND SECURITY Page0 Page1 Available as of January 1, 2014 Law Enforcement / Public Safety Courses Introduction to Terrorism Terrorism can range from complex plots to small scale attacks and can take many forms. Often,

More information

August 16 August 22, 2009 November 1 November 7, 2009

August 16 August 22, 2009 November 1 November 7, 2009 Homeland Security Executive Certificate Studies Program Strategies for Combating Terrorism: Lessons from Experts in High-Risk Environments August 16 August 22, 2009 November 1 November 7, 2009 S ecurity

More information

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Mike Pryor, 2nd BCT, 82nd Abn. Div. Public Affairs Operations

More information

LPS Security Timeline and History

LPS Security Timeline and History LPS Security Timeline and History 1980 Present: School Resource Officers (SROs) Since the 1980s, SROs have always been a part of the school community in Littleton Public Schools (LPS). SROs are sworn law

More information

united states Department of state Bureau of Diplomatic Security Diplomatic Security

united states Department of state Bureau of Diplomatic Security Diplomatic Security united states Department of state Bureau of Diplomatic Security Diplomatic Security REGIONAL SECURITY OFFICE 1 Introduction... 1 Law Enforcement and Security Services... 3 U.S. Embassy, Personnel, and

More information

SAFETY Act 101Briefing

SAFETY Act 101Briefing SAFETY Act 101Briefing The Support Anti-terrorism by Fostering Effective Technologies (SAFETY) Act of 2002 Office of SAFETY Act Implementation Science and Technology Directorate A Summary of the SAFETY

More information

QUICKSTART RULES Turn Order Rolling Dice 10s Damage Number Caps

QUICKSTART RULES Turn Order Rolling Dice 10s Damage Number Caps QUICKSTART RULES The actual rules of Terror Network are a little more involved, but here is a simplified rules section to get you started. Terror Network puts you into the role of a counter-terrorism agent.

More information

Citizen Corps Council Registration

Citizen Corps Council Registration Citizen Corps Council Registration Council Contact Information 1. Council name, area served, Council point of contact name, address, phone number, email Local Sponsoring Organization 2. Sponsoring Organization,

More information

Kenya. Abuses by Government Security Forces JANUARY 2015

Kenya. Abuses by Government Security Forces JANUARY 2015 JANUARY 2015 COUNTRY SUMMARY Kenya Kenya s efforts to tackle a wide array of security threats have been marred by ongoing patterns of serious human rights violations by Kenyan security forces, including

More information

SOTERIA. Understanding, Training, Contingency. Understanding, Training, Contingency

SOTERIA. Understanding, Training, Contingency. Understanding, Training, Contingency SOTERIA Understanding, Training, Contingency Understanding, Training, Contingency Keel Strategic s formation in 2010 was the collaborative work of a number of people from across the emerging investment

More information

Monthly summary March 2011

Monthly summary March 2011 March 2011 has seen a significant increase in the number of attacks compared to recent months: 128 attacks as opposed to 61 in February and 8 in January 2011. During the last year only March 2010 has a

More information

External Environment. and Industry Trends

External Environment. and Industry Trends External Environment External Environment and Industry Trends We have identified various external factors, emerging risks and industry trends together with our key stakeholders which may impact our business.

More information

Executive Protection Facility Security Convoy Escort

Executive Protection Facility Security Convoy Escort Executive Protection Facility Security Convoy Escort Who we are Trinity Defense Group is a highly professional security, consulting, and training organization. Trinity Defense coordinates a broad range

More information

African Journal of Criminology and Justice Studies: AJCJS, Vol.7, #s1 &2 November 2013 ISSN 1554-3897

African Journal of Criminology and Justice Studies: AJCJS, Vol.7, #s1 &2 November 2013 ISSN 1554-3897 Abstract Kenya and the Global War on Terror:Neglecting History and Geopolitics in Approaches to Counterterrorism Samuel L. Aronson, M.Sc. The London School of Economics S.L.Aronson@lse.ac.uk This article

More information

CARVER+Shock Vulnerability Assessment Tool

CARVER+Shock Vulnerability Assessment Tool Published by: Government Training Inc. ISBN: 978-09832361-7-7 CARVER+Shock Vulnerability Assessment Tool A Six Step Approach to Conducting Security Vulnerability Assessments on Critical Infrastructure

More information

Anti-Terrorism Officer (ATO) Course Seminar Description & Outline

Anti-Terrorism Officer (ATO) Course Seminar Description & Outline Anti-Terrorism Officer (ATO) Course Seminar Description & Outline Copyright 2004 by the S2 Safety & Intelligence Institute S2 Safety & Intelligence Institute, 1261 South Missouri Ave, Clearwater, FL 33756

More information

Overview: Terrorism in 2014

Overview: Terrorism in 2014 BACKGROUND REPORT Overview: Terrorism in In, more than 16,800 terrorist attacks took place worldwide, causing more than 43,500 deaths and more than 40,900 injuries, including perpetrator casualties. More

More information

Option 1: Use the Might of the U.S. Military to End the Assad Regime

Option 1: Use the Might of the U.S. Military to End the Assad Regime 1 Option 1: Use the Might of the U.S. Military to End the Assad Regime The Syrian dictatorship s use of chemical weapons against its own people was terrible. But we must not let it overshadow the larger

More information

Terrorist or freedom fighter or..?

Terrorist or freedom fighter or..? Learning outcomes Students will practice arguing and understanding views which are not necessarily their own Students will gain an understanding of how history can judge events in a different way from

More information

SPU SHOOTING MCI. 3467 3 Avenue W. Incident #14-0058018 June 5, 2014. Incident # 14-0058018

SPU SHOOTING MCI. 3467 3 Avenue W. Incident #14-0058018 June 5, 2014. Incident # 14-0058018 SPU SHOOTING MCI 3467 3 Avenue W. Incident #14-0058018 June 5, 2014 Incident # 14-0058018 This page intentionally left blank. Incident # 14-0058018 2 From the Desk of the Assistant Chief of Operations

More information

ACTIVE SHOOTER HOW TO RESPOND

ACTIVE SHOOTER HOW TO RESPOND ACTIVE SHOOTER HOW TO RESPOND October 2008 Emergency Numbers EMERGENCY SERVICES: 9-1 -1 LOCAL EMERGENCY INFORMATION LINE: LOCAL POLICE DEPARTMENT: LOCAL FIRE DEPARTMENT: LOCAL HOSPITAL: LOCAL FBI FIELD

More information

TABLETOP EXERCISE FACILITATOR S GUIDE:

TABLETOP EXERCISE FACILITATOR S GUIDE: TABLETOP EXERCISE FACILITATOR S GUIDE: ACTIVE SHOOTER EVENT Preparis INTRODUCTION Hello, my name is and I would like to welcome all of you to today s tabletop exercise. I want to thank you for taking the

More information

Lessons of Sandy Hook Elementary School

Lessons of Sandy Hook Elementary School Lessons of Sandy Hook Elementary School School Violence is not a new Phenomena July 7, 1764 first recorded incidence of school shooting/violence 11 people injured or killed when 4 Lenape American Indians

More information

From Dubrovka to Beslan: Who is learning faster?

From Dubrovka to Beslan: Who is learning faster? From Dubrovka to Beslan: Who is learning faster? PONARS Policy Memo 347 Ekaterina Stepanova Institute of World Economy and International Relations November 2004 The social, political, and religious causes

More information

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission Hearing before the House Permanent Select Committee on Intelligence Homeland Security and Intelligence: Next Steps in Evolving the Mission 18 January 2012 American expectations of how their government

More information

Hospital Security Training Solutions

Hospital Security Training Solutions Hospital Security Training Solutions The Guardian Difference Awareness Preparedness Preservation Guardian was created by School Specialty, Inc., the name you know as America s premier provider to education

More information

Background Report: 9/11, Ten Years Later

Background Report: 9/11, Ten Years Later Background Report: 9/11, Ten Years Later THE UNIQUE NATURE OF 9/11 Among terrorism incidents in the United States and around the world, al-qa ida s attacks on September 11, 21, are notably unique. FATALITIES

More information

Aon Risk Solutions Aon Crisis Management. Crisis Management Consulting Terrorism Probable Maximum Loss (PML) Studies

Aon Risk Solutions Aon Crisis Management. Crisis Management Consulting Terrorism Probable Maximum Loss (PML) Studies Aon Risk Solutions Crisis Management Consulting Terrorism Probable Maximum Loss (PML) Studies A terrorist incident at or near your operations, could result in human casualties, property damage, business

More information

Homeland Security and Protective Services CIP 43.9999 Task Grid

Homeland Security and Protective Services CIP 43.9999 Task Grid 1 Secondary Task List 100 EXPLAIN AND PERFORM SAFETY PROCEDURES 101 Demonstrate knowledge of the rules of conduct for the school and classroom. 102 Identify safety and standard operation procedures. 103

More information

Maryland Emergency Operations Plan

Maryland Emergency Operations Plan Maryland Emergency Operations Plan Purpose The purpose of the Maryland Emergency Operations Plan (EOP) is to outline an approach and designate responsibilities intended to minimize the consequences of

More information

How To Help With An International Force Mission In The United Nations

How To Help With An International Force Mission In The United Nations Exercise: Using the ISACS AT to Support Physical Security and Stockpile Management ISACS Operational Module 05.20: Stockpile Management: Weapons SCENARIO Context You are on deployment in a foreign country,

More information

V: RECOMMENDATIONS TERRORIST ATTACKS ON U.S. FACILITIES IN BENGHAZI

V: RECOMMENDATIONS TERRORIST ATTACKS ON U.S. FACILITIES IN BENGHAZI V: RECOMMENDATIONS TERRORIST ATTACKS ON U.S. FACILITIES IN BENGHAZI Recommendation: The Executive Branch should provide for a central planning and coordination mechanism (likely within an existing entity)

More information

Palestine Independent School District Crisis Management Plan 2013-2014

Palestine Independent School District Crisis Management Plan 2013-2014 Incident Command System Activation (Anytime where the physical, emotional, psychological Safety of students, faculty and/or staff is threatened.) Call 911, set up command post, and activate Crisis Response

More information

set-systems Law No. 5188 Date of Enactment 10.6.2004 LAW ABOUT PRIVATE SECURITY SERVICES

set-systems Law No. 5188 Date of Enactment 10.6.2004 LAW ABOUT PRIVATE SECURITY SERVICES LAW ABOUT PRIVATE SECURITY SERVICES set-systems Law No. 5188 Date of Enactment 10.6.2004 PART I General Provisions Goal ARTICLE 1. The goal of the present law is to define the principles and procedures

More information

2010 Oklahoma City National Memorial & Museum. 620 N Harvey Ave Oklahoma City, OK 73102 405.235.3313 or 888.542.HOPE OklahomaCityNationalMemorial.

2010 Oklahoma City National Memorial & Museum. 620 N Harvey Ave Oklahoma City, OK 73102 405.235.3313 or 888.542.HOPE OklahomaCityNationalMemorial. Oklahoma City National Memorial & Museum Discover Experience learn Lessons from the Oklahoma City Bombing Provided in cooperation with the oklahoma state department of education Investigation: The First

More information

About the Port Authority

About the Port Authority Thomas Belfiore, Chief Security Officer The Port Authority of New York and New Jersey Testimony for the House Emergency Preparedness, Response and Communications Subcommittee on Protecting our Passengers:

More information

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy 2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,

More information

Home Security: Russia s Challenges

Home Security: Russia s Challenges Home Security: Russia s Challenges A Russian Perspective Andrei Fedorov * Home security: Russia s challenges Home security and the struggle against terrorism is one of the most crucial issues for the Russian

More information

Security at San Onofre

Security at San Onofre Security at San Onofre April 16, 2015 Ross Quam Security Manager Overview 1. Mission 2. Adversary Characteristics 3. Plans and Procedures 4. Insider Mitigation 5. Local Law Enforcement Agency Support 2

More information

Oil & Gas Industry Towards Global Security. A Holistic Security Risk Management Approach. www.thalesgroup.com/security-services

Oil & Gas Industry Towards Global Security. A Holistic Security Risk Management Approach. www.thalesgroup.com/security-services Oil & Gas Industry Towards Global Security A Holistic Security Risk Management Approach www.thalesgroup.com/security-services Oil & Gas Industry Towards Global Security This white paper discusses current

More information

SURVIVING AN ACTIVE SHOOTER / / FULL TRANSCRIPT

SURVIVING AN ACTIVE SHOOTER / / FULL TRANSCRIPT SURVIVING AN ACTIVE SHOOTER / / FULL TRANSCRIPT (music playing) Male News Reporter: A morning that began like any other turned tragic today, when an employee opened fire on his supervisor and fellow co-workers.

More information

Global Security Academy

Global Security Academy Global Security Academy Athena GS3 Security implementation Systems Ltd. 5 Hatzoref St, Holon, 58856, Israel Tel: +972 3 5572462 Fax: +972 3 5572472 www.athenalss.com Message from Chief Executive Officer

More information

Lessons Learned in Response and Recovery: Northern Illinois University

Lessons Learned in Response and Recovery: Northern Illinois University U.S. Department of Education Office of Safe and Drug-Free Schools Emergency Management for Higher Education FY 2009 Final Grantee Meeting Philadelphia, PA August 5 6, 2010 Lessons Learned in Response and

More information

Qualifications FISK CONSULTANTS

Qualifications FISK CONSULTANTS Qualifications FISK CONSULTANTS All Hazards Emergency Management Consultant (Business Continuity, Risk and Vulnerability Assessment & Management, Corporate & Personal Protection, Emerging Threats, Active

More information

Executive Protection Training Program

Executive Protection Training Program TECHNICAL SURVEILLANCE COUNTER-MEASURES, EXECUTIVE PROTECTION & PRACTICAL TRAINING SOLUTIONS FOR TODAY S WORLD Executive Protection Training Program Comprehensive, Realistic, Relevant & Valuable 7 Day

More information

Victims of Terrorism An Overview on International Legislation on the Support and Compensation for Victims of Terrorist Threats. Dr.

Victims of Terrorism An Overview on International Legislation on the Support and Compensation for Victims of Terrorist Threats. Dr. Victims of Terrorism An Overview on International Legislation on the Support and Compensation for Victims of Terrorist Threats Dr. Michael Kilchling "The Member States of the Council of Europe and the

More information

Introduction. Catastrophic Incident Annex. Cooperating Agencies: Coordinating Agency: Department of Homeland Security

Introduction. Catastrophic Incident Annex. Cooperating Agencies: Coordinating Agency: Department of Homeland Security Catastrophic Incident Annex Coordinating Agency: Department of Homeland Security Cooperating Agencies: All Federal departments and agencies (and other organizations) with assigned primary or supporting

More information

Security and Law Enforcement Community of Interest 1811-Criminal Investigating Career Road Map

Security and Law Enforcement Community of Interest 1811-Criminal Investigating Career Road Map Security and Law Enforcement Community of Interest 1811-Criminal Investigating Career Road Map Prepared by: Booz Allen Hamilton Career Progression within the 1811 Occupational Series is Marked by Support

More information

LaSorsa & Associates

LaSorsa & Associates Practical Training Solutions for Today's World Reality - Efficiency - Survivability LaSorsa & Associates Executive Protection Consulting & Risk Mitigation SIGN UP NOW Evasive Driving Medical Response TECHNICAL

More information

our enterprise security Empowering business

our enterprise security Empowering business our enterprise security Empowering business Introduction Communication is changing the way we live and work. Ericsson plays a key role in this evolution, using innovation to empower people, business and

More information

POINT UNIVERSITY CAMPUS SECURITY Emergency Response Plan

POINT UNIVERSITY CAMPUS SECURITY Emergency Response Plan POINT UNIVERSITY CAMPUS SECURITY Emergency Response Plan Introduction The Point University Emergency Response Plan establishes guidelines for campus-wide communication, service coordination and safety

More information

An Introduction to. Business Continuity Planning

An Introduction to. Business Continuity Planning An Introduction to Business Continuity Planning Company Profile Practical Experience European Head Office Extensive Client Base Established 1998 Expert Consultants Global Network Why BCP? I am often asked

More information

A Commander s Perspective on Building the Capacity of Foreign Countries Military Forces

A Commander s Perspective on Building the Capacity of Foreign Countries Military Forces STATEMENT OF GENERAL JAMES L. JONES, USMC COMMANDER, UNITED STATES EUROPEAN COMMAND BEFORE THE HOUSE ARMED SERVICES COMMITTEE ON APRIL 7, 2006 A Commander s Perspective on Building the Capacity of Foreign

More information

EXECUTIVE SUMMARY BLACK FRIDAY CARNAGE IN RAFAH DURING 2014 ISRAEL/GAZA CONFLICT

EXECUTIVE SUMMARY BLACK FRIDAY CARNAGE IN RAFAH DURING 2014 ISRAEL/GAZA CONFLICT EXECUTIVE SUMMARY BLACK FRIDAY CARNAGE IN RAFAH DURING 2014 ISRAEL/GAZA CONFLICT EXECUTIVE SUMMARY On 8 July 2014, Israel launched a military operation codenamed Operation Protective Edge, the third major

More information

White Paper HOTEL SECURITY

White Paper HOTEL SECURITY White Paper HOTEL SECURITY HOTEL SECURITY WHITE PAPER BY CHARLES GOSLIN Charles Goslin, Vice President of International Operations for Duos Technologies, Inc., is an international expert in security threat

More information

Impact of Transition on Health Care Delivery

Impact of Transition on Health Care Delivery Agency Coordinating Body for Afghan Relief & Development Impact of Transition on Health Care Delivery The security transition in Afghanistan is entering its final phase in 2014, with partial withdrawal

More information

RECURRENT FLIGHT SCHOOL SECURITY AWARENESS (FSSA) TRAINING

RECURRENT FLIGHT SCHOOL SECURITY AWARENESS (FSSA) TRAINING U.S. Department of Homeland Security Arlington, VA 22202 RECURRENT FLIGHT SCHOOL SECURITY AWARENESS (FSSA) TRAINING Recurrent FSSA Training for Flight School Employees and independent Certified Flight

More information

Mass Gatherings Medical Strategies for Weapons of Mass Destruction

Mass Gatherings Medical Strategies for Weapons of Mass Destruction Mass Gatherings Medical Strategies for Weapons of Mass Destruction Kristi L. Koenig, MD, FACEP Professor of Clinical Emergency Medicine Director of Public Health Preparedness Co-Director, EMS and Disaster

More information

The structure and organization of the Fusion Center takes its direction from four key documents, they are:

The structure and organization of the Fusion Center takes its direction from four key documents, they are: The structure and organization of the Fusion Center takes its direction from four key documents, they are: Northern Operational Office MISSION We incorporate information and utilize relationships formed

More information

The Effect of Terrorism: Evaluating Kenya's Tourism Crisis

The Effect of Terrorism: Evaluating Kenya's Tourism Crisis Benjamin K. Kuto University of Missouri Columbia James L. Groves University of Missouri Columbia The Effect of Terrorism: Evaluating Kenya's Tourism Crisis The purpose of this paper is to provide information

More information

Results of Palestinian Public Opinion Poll No 25 22-24 January 2006

Results of Palestinian Public Opinion Poll No 25 22-24 January 2006 An-Najah National University Center for Opinion Polls and Survey Studies Tel: (972) (9) 2345113 Fax: (972)(9) 2345982 Nablus Palestinian: P.O.Box 7, 707 Email: Polls@najah.edu hussein596@yahoo.com Results

More information

Remote Monitoring offers a comprehensive range of services, which are continually

Remote Monitoring offers a comprehensive range of services, which are continually Remote Monitoring Since the early 1990 s commercial remote monitoring has provided security solutions across a broad spectrum of industries. As the threat of crime and the cost of manned guarding have

More information

Factors to Consider When Developing an Evacuation Plan

Factors to Consider When Developing an Evacuation Plan The following should be viewed only as suggestions: Factors to Consider When Developing an Evacuation Plan 1. You must identify your document with a specific title and explanation. Example: Evacuation

More information

Center for Terrorism Law Monthly Activity Report April 2009

Center for Terrorism Law Monthly Activity Report April 2009 Center for Terrorism Law Monthly Activity Report April 2009 1. The Center for Terrorism Law conducted a national symposium from 30 April 1 May 2009 in Houston, Texas, to provide information on how to develop

More information

An Overview of Emergency Management in Fairfax County. Presented by: Ellen Kamilakis Fairfax County Office of Emergency Management

An Overview of Emergency Management in Fairfax County. Presented by: Ellen Kamilakis Fairfax County Office of Emergency Management An Overview of Emergency Management in Fairfax County Presented by: Ellen Kamilakis Fairfax County Office of Emergency Management Fairfax County Office of Emergency Management All hazards approach approach

More information

Emergency Management

Emergency Management Slide 1 Emergency Management Annual Training Module Welcome to the Emergency Management Learning Module. Emergency Management, Safety and Security are critical areas of operation within Lehigh Valley Health

More information

Tactical Range Facility. Criminal Justice. Sgt. Major James Massey Range

Tactical Range Facility. Criminal Justice. Sgt. Major James Massey Range Tactical Range Facility Criminal Sgt. Major James Massey Range 11 Classes Offered Officer Safety & Field Tactics Officer Safety & Field Tactics in a Terrorism Environment Officer Safety & Field Tactics

More information

PENNSYLVANIA COLLEGE CAMPUS SECURITY ASSESSMENT REPORT

PENNSYLVANIA COLLEGE CAMPUS SECURITY ASSESSMENT REPORT PENNSYLVANIA COLLEGE CAMPUS SECURITY ASSESSMENT REPORT PENNSYLVANIA STATE POLICE DOMESTIC SECURITY OFFICE RISK AND VULNERABILITY ASSESSMENT TEAM ASSESSMENT CONDUCTED APRIL AUGUST, 2007 In the wake of unspeakable

More information

Operation Tomodachi. and Lessons Learned. of Energy s Consequence. q Management Response Team (CMRT) to the. Reactor Accident

Operation Tomodachi. and Lessons Learned. of Energy s Consequence. q Management Response Team (CMRT) to the. Reactor Accident DOE/NV/25946--1560 Operation Tomodachi Japan Response Spring 2011 Operation Tomodachi A D t P d t Answers, Data Products, and Lessons Learned from the U.S. U S Department of Energy s Consequence q Management

More information

USE OF FORCE. Attorney General's Use of Force Policy. Issued April 1985 Revised June 2000

USE OF FORCE. Attorney General's Use of Force Policy. Issued April 1985 Revised June 2000 USE OF FORCE Attorney General's Use of Force Policy Issued April 1985 Revised June 2000 Preface The provisions of this revised policy are a product of the collective efforts and judgment of the New Jersey

More information

INFORMATION AND ADVICE ABOUT TRAVELLING TO SYRIA

INFORMATION AND ADVICE ABOUT TRAVELLING TO SYRIA INFORMATION AND ADVICE ABOUT TRAVELLING TO SYRIA The Foreign and Commonwealth Office advises against all travel to Syria You are at risk if you travel to Syria. The whole of Syria is unsafe, and many ordinary

More information

Assessment of the terror threat to Denmark

Assessment of the terror threat to Denmark 28 April 2016 Assessment of the terror threat to Denmark Summary The terror threat to Denmark remains significant. This means that there are individuals with intent and capacity to commit terrorist attacks

More information

Incident Response to Terrorist Bombings (IRTB) Information Package

Incident Response to Terrorist Bombings (IRTB) Information Package Weapons of Mass Destruction Training Incident Response to Terrorist Bombings (IRTB) Information Package (09/01/06) New Mexico Tech Energetic Material Research and Testing Center EMRTC 801 Leroy Place Socorro,

More information

Developing Partnerships with Fire Departments and Emergency Medical Services for Achieving Business Continuity Success

Developing Partnerships with Fire Departments and Emergency Medical Services for Achieving Business Continuity Success Dr. Bill Lowe, EFO, EMT-P, MIFireE Jacksonville State University (Alabama) Developing Partnerships with Fire Departments and Emergency Medical Services for Achieving Business Continuity Success Dr. Bill

More information

FREEDOM OF INFORMATION REQUEST

FREEDOM OF INFORMATION REQUEST FREEDOM OF INFORMATION REQUEST Request Number: F 2011 01978 Keyword: Crime Subject: Cameras Request and Answer: Question There appears to be a load of new cameras appearing outside police stations and

More information

Surveillance and Security Systems

Surveillance and Security Systems Surveillance and Security Systems Surveillance & Security Systems Surveillance Company Overview and Security Systems Company Overview Company Overview Ultra Electronics Surveillance and Security Systems

More information

epp european people s party

epp european people s party Protecting refugees - securing the EU s external borders - sting up action against irregular migration Adopted by the EPP Summit 23 September 2015 01 Protecting refugees - securing the EU s external borders

More information

Business Continuity Management Systems. Protecting for tomorrow by building resilience today

Business Continuity Management Systems. Protecting for tomorrow by building resilience today Business Continuity Management Systems Protecting for tomorrow by building resilience today Vital statistics 31% 40% of UK businesses have been affected by bad weather related transport problems, power

More information

Relationship to National Response Plan Emergency Support Function (ESF)/Annex

Relationship to National Response Plan Emergency Support Function (ESF)/Annex RISK MANAGEMENT Capability Definition Risk Management is defined by the Government Accountability Office (GAO) as A continuous process of managing through a series of mitigating actions that permeate an

More information

FirstToSee: Leveraging Social Media for Emergency Response. June 21, 2013

FirstToSee: Leveraging Social Media for Emergency Response. June 21, 2013 FirstToSee: Leveraging Social Media for Emergency Response June 21, 2013 1 Overview Social media now plays a critical role in how the public communicates during an emergency. The FirstToSee Emergency Support

More information

Course Title: HSE-101 Introduction to Homeland Security Prerequisites: None Credit Hours: 3 lectures, 3 hours

Course Title: HSE-101 Introduction to Homeland Security Prerequisites: None Credit Hours: 3 lectures, 3 hours Bergen Community College Division of Business, Social Science and Criminal Justice and Homeland Security Department of Criminal Justice and Homeland Security Master Course Syllabus Course Title: HSE-101

More information

UNION COLLEGE INCIDENT RESPONSE PLAN

UNION COLLEGE INCIDENT RESPONSE PLAN UNION COLLEGE INCIDENT RESPONSE PLAN The college is committed to supporting the safety and welfare of all its students, faculty, staff and visitors. It also consists of academic, research and other facilities,

More information

Physical Security. Overview

Physical Security. Overview Physical Security Currently in this Country defence and security including private sector have responded to rising concerns about theft, fraud, and terrorism by sharpening their focus on physical security

More information

Dear Film and/or Music Production Company,

Dear Film and/or Music Production Company, Dear Film and/or Music Production Company, On behalf of the Muskegon City Commission, City of Muskegon staff and the Citizens of Muskegon, I would like to welcome you to our City for your filming and production

More information

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing

More information